
Cinderella and the signature-based detection
We examine the tale of Cinderella, one of the earliest stories that attempts to teach children basic cybersecurity principles.
14 articles
We examine the tale of Cinderella, one of the earliest stories that attempts to teach children basic cybersecurity principles.
We examine the first installment in the Die Hard series from a cybersecurity standpoint.
If we are to believe the science-fiction of the last century, the hackers of 2020 should have access to a rather curious toolkit.
We trace how the perception of hackers has evolved based on the classic traffic-light-hacking scheme in three versions (British, American, Indian) of The Italian Job.
The legend of the Pied Piper of Hamelin has been used before as an allegory of real, tragic events. Here’s our take.
To mark the film’s 25th anniversary, we examine Hackers in terms of modern information security.
It turns out that the tale of Ali Baba is a collection of stories from ancient Persia about … cyberthreats?
Hans Christian Andersen’s report on the Kai infection incident, and the investigation by infosec expert Gerda.
A long time ago in a galaxy far, far away, a lone Mandalorian warrior suffered from cybersecurity issues, both other people’s fault and his own.
The Brothers Grimm fairy tales are deep source of object lessons in information security — not just for children, but also for adults.
In the latest Terminator movie, is Sarah Connor protected against cell-phone tracking?
Before the world release of Terminator: Dark Fate, we decided to check in on the state of cybersecurity in the Terminator universe.
Analysis of Sauron’s hacking tools implemented in the devices known as Rings of Power.